The list, Ping
Let me know if you would like to be on or off the ping list
As soon as she began publishing stories about fast and furious would be my guess as to when this hacking began. My sense is DOJ was interested in her sources within the government, especially in ATF and the legislative branch.
Exploiting a Windows operating system is neither hard nor sophisticated. In the case of buffer and unpatched database exploits, there are more holes than one could possibly count.
Most corporate entities don’t have sufficient security for their systems, esp. once you get inside. If a hacker managed to brute force a password or use DDOS find open ports, once they’re inside, the kingdom is theirs.
I believe that she was an obama worshiperand enabler and that she worked for an obama worshiper and enabler organization. If this is how obama does his friends, what do you expect him to do to his enemies. And you can bet your ass this was done at either obama’s order or his expectation.But then agan, when one rides a tighr, sometimes the tighr turns and eats said rider.
With the multitude of scandals, revelations and whistle-blowing, I’m sure the commies in charge hire commie “contractors” for their dirty, unconstitutional jobs.
As long as taxpayers’ money is plenty, you’ll get no whistle-blowing and you’ll never be able to trace hacking back to the regime and it’s cronies.
However, the opposite isn’t true, i.e., hacking commies will be found in a NY minute from the NSA-collected data. This would be advertised, mega-horned by the MSM (who at last found something to “report”) and quite likely a speech from 0b0z0 about finding the needle in haystack!
If they were that skilled and that sophistacated, no one would ever know.